SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Downloaden Sie, um offline zu lesen
1
1
© 2022 TrustArc Inc. Proprietary and Confidential Information.
7 Key Steps Your Data Privacy Program Needs
2
2
Speakers
Andrew Scott
Global Privacy Manager,
TrustArc
Gary Edwards
Executive Advisor,
Golfdale Consulting
3
3
Agenda
• 7 Key Steps to Privacy
• 5 Key Outcomes to Privacy
• 2022 Global Privacy Index “Keys to Privacy” Results
• How to effectively measure your privacy
• Importance of identification of vendors involved
• The impact of privacy software that has a purpose
• Q & A
4
Overview
2022 marks the 3rd
annual TrustArc Global Privacy Benchmarks Survey
Gathered global views on privacy as it relates to day-to-day operations, leadership, organizational approaches, and
confidence
Provides YoY trends in the Global Privacy Index, comprised of Seven Keys to Privacy and Five Outcomes that Matter
Includes full 360° views from executives, managers and frontline employees, along with privacy team leaders and
privacy team employees
5
● Leaders look for global guidance on creating great workplaces of the future
Why Benchmarks Matter!
Gallup Q12 Edelman Trust Barometer
https://www.gallup.com/workplace/349484/state-of-the-global-workplace-2022-report.aspx https://www.edelman.com/trust/2022-trust-barometer
6
Privacy Program Maturity Levels
1. Ad Hoc: Procedures or processes are generally informal, incomplete,
and inconsistently applied.
2. Repeatable: Procedures and processes exist, but they are neither fully
documented or implemented nor cover all relevant aspects.
3. Defined: Procedures and processes are fully documented and
implemented and cover all relevant aspects.
4. Managed: Reviews are conducted to assess the effectiveness of the
controls that are in place.
5. Optimized: Regular review and feedback are used to ensure
continual improvement toward optimization of a given
process.
7
● With an onslaught of new threats and ever-growing regulations, orgs need to get organized on privacy
2022 TrustArc Global Privacy Benchmarks
TrustArc’s 7 Keys to Privacy
https://trustarc.com/global-privacy-benchmarks-report/?nocache
8
Keys to Privacy Findings
9
7th
Key to Privacy:
Privacy Importance
How organizations approach privacy - levels of importance in how it affects day to day business decisions
• Privacy is of great importance and permeates almost every decision taken.
• Privacy is important and gets considered in many decisions.
• Privacy is somewhat important and gets considered in some decisions.
• Privacy is not of much importance and gets considered only in a few major decisions.
10
Privacy Importance (a closer look)
11
Privacy Importance (a closer look)
12
Confidence in Outcomes
How much confidence do you think these key stakeholders have in your company's
management of data privacy? [excludes “Don’t know/Prefer not to answer”]
Our customers/
clients
Our
employees
The general
public
Partners and
third parties
13
Overall Confidence
How confident are you that your company is able to keep all of your employees and your
customers' relevant data secure and protected? [excludes “Don’t know/Prefer not to answer”]
14
2022 Global Privacy Index “Keys to Privacy”
Results
15
Keys to Privacy
Keys to Privacy Index Distribution YoY
• Allocated points based on a principle that marks should be deducted where privacy was perceived by
stakeholders to be compromised
• Indexed a Grand Mean of the ratings such that they could range from +100 down to -100.
16
Keys to Privacy
By Revenue
Keys to Privacy Index Distribution YoY
17
Index Scores by Privacy
Measurement
18
Primary Method of
Measurement
19
Privacy Keys by KPIs
20
The Impact of “Made to Purpose” Software
21
Primary Solution to
Manage Privacy Program
22
Type of Software Solution
Adopted by Privacy Teams
23
Likelihood of Purchasing
“Made to Purpose”
Privacy Software Solution
24
24
Interested in TrustArc Solutions?
25
25
Attendee Q&A
26
26
Thank You!
See http://www.trustarc.com/insightseries for
the 2022 Privacy Insight Series and past
webinar recordings.
If you would like to learn more about how TrustArc can support
you with compliance, please reach out to sales@trustarc.com for a
free demo.

Weitere ähnliche Inhalte

Ähnlich wie 7 Key Steps Your Data Privacy Program Needs

Doing More with Less - It's not just a mantra, it's a necessity
Doing More with Less - It's not just a mantra, it's a necessityDoing More with Less - It's not just a mantra, it's a necessity
Doing More with Less - It's not just a mantra, it's a necessityKeyedIn Projects
 
DAH15 : Bray Goverance - Not Dirty Words
DAH15 : Bray  Goverance - Not Dirty WordsDAH15 : Bray  Goverance - Not Dirty Words
DAH15 : Bray Goverance - Not Dirty WordsoGuild .
 
IBM Impact 2012 - Social Business Bootcamp
IBM Impact 2012 - Social Business BootcampIBM Impact 2012 - Social Business Bootcamp
IBM Impact 2012 - Social Business BootcampPerficient, Inc.
 
Rethinking business decisions and processes for digital transformation
Rethinking business decisions and processes for digital transformationRethinking business decisions and processes for digital transformation
Rethinking business decisions and processes for digital transformationJudy Breedlove
 
ISO 37002:2021 (Whistleblowing Management Systems) Awareness Training
ISO 37002:2021 (Whistleblowing Management Systems) Awareness TrainingISO 37002:2021 (Whistleblowing Management Systems) Awareness Training
ISO 37002:2021 (Whistleblowing Management Systems) Awareness TrainingOperational Excellence Consulting
 
Real-World Data Governance: What is a Data Steward and What Do They Do?
Real-World Data Governance: What is a Data Steward and What Do They Do?Real-World Data Governance: What is a Data Steward and What Do They Do?
Real-World Data Governance: What is a Data Steward and What Do They Do?DATAVERSITY
 
Key Elements of a Successful Data Governance Program
Key Elements of a Successful Data Governance ProgramKey Elements of a Successful Data Governance Program
Key Elements of a Successful Data Governance ProgramDATAVERSITY
 
Creating a Social Enterprise: Segmentation’s Critical Role in Uncovering Soci...
Creating a Social Enterprise: Segmentation’s Critical Role in Uncovering Soci...Creating a Social Enterprise: Segmentation’s Critical Role in Uncovering Soci...
Creating a Social Enterprise: Segmentation’s Critical Role in Uncovering Soci...Brandwatch
 
The Data Effect: Canadian Big Data & Analytics Update - Dr. Alison Brooks Dir...
The Data Effect: Canadian Big Data & Analytics Update - Dr. Alison Brooks Dir...The Data Effect: Canadian Big Data & Analytics Update - Dr. Alison Brooks Dir...
The Data Effect: Canadian Big Data & Analytics Update - Dr. Alison Brooks Dir...CityAge
 
Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...
Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...
Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...PECB
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planninggoreankush1
 
AAC Training Presentation 2009
AAC  Training  Presentation 2009AAC  Training  Presentation 2009
AAC Training Presentation 2009Michelle Hoskin
 
Prioritize Your Projects - Rinse and Repeat
Prioritize Your Projects - Rinse and RepeatPrioritize Your Projects - Rinse and Repeat
Prioritize Your Projects - Rinse and RepeatKeyedIn Projects
 
Doing #noProjects in Large Organizations (Codemotion 2015)
Doing #noProjects in Large Organizations (Codemotion 2015)Doing #noProjects in Large Organizations (Codemotion 2015)
Doing #noProjects in Large Organizations (Codemotion 2015)Unai Roldán
 
Extending Business Architecture with Regulatory Architecture using Decisions ...
Extending Business Architecture with Regulatory Architecture using Decisions ...Extending Business Architecture with Regulatory Architecture using Decisions ...
Extending Business Architecture with Regulatory Architecture using Decisions ...Decision Management Solutions
 
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...TrustArc
 
Data Quality Best Practices
Data Quality Best PracticesData Quality Best Practices
Data Quality Best PracticesDATAVERSITY
 
How Deloitte Approaches Global Employer Branding
How Deloitte Approaches Global Employer BrandingHow Deloitte Approaches Global Employer Branding
How Deloitte Approaches Global Employer BrandingGlassdoor
 

Ähnlich wie 7 Key Steps Your Data Privacy Program Needs (20)

Doing More with Less - It's not just a mantra, it's a necessity
Doing More with Less - It's not just a mantra, it's a necessityDoing More with Less - It's not just a mantra, it's a necessity
Doing More with Less - It's not just a mantra, it's a necessity
 
DAH15 : Bray Goverance - Not Dirty Words
DAH15 : Bray  Goverance - Not Dirty WordsDAH15 : Bray  Goverance - Not Dirty Words
DAH15 : Bray Goverance - Not Dirty Words
 
IBM Impact 2012 - Social Business Bootcamp
IBM Impact 2012 - Social Business BootcampIBM Impact 2012 - Social Business Bootcamp
IBM Impact 2012 - Social Business Bootcamp
 
Rethinking business decisions and processes for digital transformation
Rethinking business decisions and processes for digital transformationRethinking business decisions and processes for digital transformation
Rethinking business decisions and processes for digital transformation
 
ISO 37002:2021 (Whistleblowing Management Systems) Awareness Training
ISO 37002:2021 (Whistleblowing Management Systems) Awareness TrainingISO 37002:2021 (Whistleblowing Management Systems) Awareness Training
ISO 37002:2021 (Whistleblowing Management Systems) Awareness Training
 
Real-World Data Governance: What is a Data Steward and What Do They Do?
Real-World Data Governance: What is a Data Steward and What Do They Do?Real-World Data Governance: What is a Data Steward and What Do They Do?
Real-World Data Governance: What is a Data Steward and What Do They Do?
 
Key Elements of a Successful Data Governance Program
Key Elements of a Successful Data Governance ProgramKey Elements of a Successful Data Governance Program
Key Elements of a Successful Data Governance Program
 
Creating a Social Enterprise: Segmentation’s Critical Role in Uncovering Soci...
Creating a Social Enterprise: Segmentation’s Critical Role in Uncovering Soci...Creating a Social Enterprise: Segmentation’s Critical Role in Uncovering Soci...
Creating a Social Enterprise: Segmentation’s Critical Role in Uncovering Soci...
 
The Data Effect: Canadian Big Data & Analytics Update - Dr. Alison Brooks Dir...
The Data Effect: Canadian Big Data & Analytics Update - Dr. Alison Brooks Dir...The Data Effect: Canadian Big Data & Analytics Update - Dr. Alison Brooks Dir...
The Data Effect: Canadian Big Data & Analytics Update - Dr. Alison Brooks Dir...
 
Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...
Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...
Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...
 
Improve Analytic Results with Decision Modeling
Improve Analytic Results with Decision ModelingImprove Analytic Results with Decision Modeling
Improve Analytic Results with Decision Modeling
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planning
 
AAC Training Presentation 2009
AAC  Training  Presentation 2009AAC  Training  Presentation 2009
AAC Training Presentation 2009
 
Prioritize Your Projects - Rinse and Repeat
Prioritize Your Projects - Rinse and RepeatPrioritize Your Projects - Rinse and Repeat
Prioritize Your Projects - Rinse and Repeat
 
Doing #noProjects in Large Organizations (Codemotion 2015)
Doing #noProjects in Large Organizations (Codemotion 2015)Doing #noProjects in Large Organizations (Codemotion 2015)
Doing #noProjects in Large Organizations (Codemotion 2015)
 
From 'I think' to 'I know'
From 'I think' to 'I know'From 'I think' to 'I know'
From 'I think' to 'I know'
 
Extending Business Architecture with Regulatory Architecture using Decisions ...
Extending Business Architecture with Regulatory Architecture using Decisions ...Extending Business Architecture with Regulatory Architecture using Decisions ...
Extending Business Architecture with Regulatory Architecture using Decisions ...
 
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
 
Data Quality Best Practices
Data Quality Best PracticesData Quality Best Practices
Data Quality Best Practices
 
How Deloitte Approaches Global Employer Branding
How Deloitte Approaches Global Employer BrandingHow Deloitte Approaches Global Employer Branding
How Deloitte Approaches Global Employer Branding
 

Mehr von TrustArc

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc
 
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc
 
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...TrustArc
 
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...TrustArc
 
Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesTrustArc
 
CBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceTrustArc
 
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfTrustArc
 
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...TrustArc
 
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsTrustArc
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsTrustArc
 
The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...TrustArc
 
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdfTrustArc
 
Artificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceTrustArc
 
How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023TrustArc
 
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act:  Using Consumer Data and Maintaining TrustThe Ultimate Balancing Act:  Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act: Using Consumer Data and Maintaining TrustTrustArc
 
The Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To KnowThe Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To KnowTrustArc
 
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdfTrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdfTrustArc
 

Mehr von TrustArc (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
 
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI Innovations
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
 
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
 
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
 
Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 States
 
CBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy Compliance
 
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
 
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
 
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy Certifications
 
The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...
 
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
 
Artificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI Governance
 
How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023
 
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act:  Using Consumer Data and Maintaining TrustThe Ultimate Balancing Act:  Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
 
The Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To KnowThe Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To Know
 
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdfTrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
 

Kürzlich hochgeladen

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Kürzlich hochgeladen (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

7 Key Steps Your Data Privacy Program Needs

  • 1. 1 1 © 2022 TrustArc Inc. Proprietary and Confidential Information. 7 Key Steps Your Data Privacy Program Needs
  • 2. 2 2 Speakers Andrew Scott Global Privacy Manager, TrustArc Gary Edwards Executive Advisor, Golfdale Consulting
  • 3. 3 3 Agenda • 7 Key Steps to Privacy • 5 Key Outcomes to Privacy • 2022 Global Privacy Index “Keys to Privacy” Results • How to effectively measure your privacy • Importance of identification of vendors involved • The impact of privacy software that has a purpose • Q & A
  • 4. 4 Overview 2022 marks the 3rd annual TrustArc Global Privacy Benchmarks Survey Gathered global views on privacy as it relates to day-to-day operations, leadership, organizational approaches, and confidence Provides YoY trends in the Global Privacy Index, comprised of Seven Keys to Privacy and Five Outcomes that Matter Includes full 360° views from executives, managers and frontline employees, along with privacy team leaders and privacy team employees
  • 5. 5 ● Leaders look for global guidance on creating great workplaces of the future Why Benchmarks Matter! Gallup Q12 Edelman Trust Barometer https://www.gallup.com/workplace/349484/state-of-the-global-workplace-2022-report.aspx https://www.edelman.com/trust/2022-trust-barometer
  • 6. 6 Privacy Program Maturity Levels 1. Ad Hoc: Procedures or processes are generally informal, incomplete, and inconsistently applied. 2. Repeatable: Procedures and processes exist, but they are neither fully documented or implemented nor cover all relevant aspects. 3. Defined: Procedures and processes are fully documented and implemented and cover all relevant aspects. 4. Managed: Reviews are conducted to assess the effectiveness of the controls that are in place. 5. Optimized: Regular review and feedback are used to ensure continual improvement toward optimization of a given process.
  • 7. 7 ● With an onslaught of new threats and ever-growing regulations, orgs need to get organized on privacy 2022 TrustArc Global Privacy Benchmarks TrustArc’s 7 Keys to Privacy https://trustarc.com/global-privacy-benchmarks-report/?nocache
  • 8. 8 Keys to Privacy Findings
  • 9. 9 7th Key to Privacy: Privacy Importance How organizations approach privacy - levels of importance in how it affects day to day business decisions • Privacy is of great importance and permeates almost every decision taken. • Privacy is important and gets considered in many decisions. • Privacy is somewhat important and gets considered in some decisions. • Privacy is not of much importance and gets considered only in a few major decisions.
  • 10. 10 Privacy Importance (a closer look)
  • 11. 11 Privacy Importance (a closer look)
  • 12. 12 Confidence in Outcomes How much confidence do you think these key stakeholders have in your company's management of data privacy? [excludes “Don’t know/Prefer not to answer”] Our customers/ clients Our employees The general public Partners and third parties
  • 13. 13 Overall Confidence How confident are you that your company is able to keep all of your employees and your customers' relevant data secure and protected? [excludes “Don’t know/Prefer not to answer”]
  • 14. 14 2022 Global Privacy Index “Keys to Privacy” Results
  • 15. 15 Keys to Privacy Keys to Privacy Index Distribution YoY • Allocated points based on a principle that marks should be deducted where privacy was perceived by stakeholders to be compromised • Indexed a Grand Mean of the ratings such that they could range from +100 down to -100.
  • 16. 16 Keys to Privacy By Revenue Keys to Privacy Index Distribution YoY
  • 17. 17 Index Scores by Privacy Measurement
  • 20. 20 The Impact of “Made to Purpose” Software
  • 21. 21 Primary Solution to Manage Privacy Program
  • 22. 22 Type of Software Solution Adopted by Privacy Teams
  • 23. 23 Likelihood of Purchasing “Made to Purpose” Privacy Software Solution
  • 26. 26 26 Thank You! See http://www.trustarc.com/insightseries for the 2022 Privacy Insight Series and past webinar recordings. If you would like to learn more about how TrustArc can support you with compliance, please reach out to sales@trustarc.com for a free demo.